Are you a security monitoring specialist that is ready to take on a consultancy role, helping different clients with various projects with advice and hands on work, for best in class cyber threat defense & security monitoring solutions and relevant services, as part of a strong security team?
This could be an interesting next step to either further build your consulting expertise or step into the world of being a trusted advisor for large international organisations active in various areas! You can add value to the team effort in servicing these clients in security monitoring areas like SIEM, use case development, cyber threat management and intelligence, defensive strategies, attack simulation, log file aggregation etc. and build expertise in new areas of information security you are interested in! All these in a fast paced environment, interesting and complex local and international projects with a great team in an organization that information security is a priority.
Some more of the role details, requirements and responsibilities:
- Good experience and knowledge in the information security field and security monitoring in particular; SIEM, threat management, defensive strategies, log file aggregation or experience in projects in other relevant areas could be it. You’ve used tools like ArcSight, Splunk, QRadar or similar and put them at work!
- Experience in a consulting role in not a pre-requirement; depending on expertise level and know how, different levels of seniority and leadership responsibilities exist in the team.
- You understand well the security monitoring area, developments in this arena such as Structured Threat Information eXpression or Trusted Automated eXchange of Indicator Information for cyber risk intelligence and defensive strategies sharing and collaboration or have interest to further explore those developments, and can utilize this to provide the best advice and solutions to clients. This includes understanding the latest attacker techniques, tactics and procedures and can improve detection by creating the right use cases.
- You want to grow in the security monitoring area, have an interest to further explore and understand its future and share your thoughts and knowledge with internal and external stakeholders (team members, clients, conferences & the security community).
- Good communication skills, able to talk to both business and technical stakeholders on security related matters, and work them to find and implement the right solutions.
- Hands on mentality, combining technical experience and skills with the ability to listen and understand issues, translate in needs and find solutions for the success of the business of your clients.
Reach out for a full conversation and details on the role, the team, opportunities in this organization and overall environment!
Relevant terms:
IT Security, Information Security, Cybersecurity, Security Monitoring, Blue Team, Purple Team, Cyber Risk Intelligence, Cyber Threat Management, STIX, SIEM, Attack Simulation, Use Cases, Use Case Development, TAXII, TTP, ArcSiht, QRadar, Splunk, Defensive, Attack patterns, CISSP, CISM, CEH, Security Information & Event Management, Policy, Procedures, Practisses, Security Monitoring Architecture.
Base Cyber Security helps organizations build knowledge and capabilities in information security. Supporting organizations putting together strong infosec teams or finding the right cyber security experts for their needs is a big part of that.
We work with security professionals globally for information and cyber security roles and projects across all industries in Europe. Whether you are starting your career in information security, need advice for your next step, deciding on how to build knowledge or choose a growth area in security to continue with, let’s have a conversation!
If you have not yet registered with the Base Cyber Security network, be sure to do so! Send us your details at [email protected] & follow us on Twitter @BaseCyberSec to stay up to date with our activities and relevant info.
By registering with the security community and / or showing interest in a specific role, project or team, you agree with sharing your personal information with Base Cyber Security, which will in turn collect, use and process this in an ethical, private and compliant (including under the GDPR where applicable) manner.